Recorded Future

Channel profile:

Real-Time Threat Intelligence

Recorded Future arms you with real-time threat intelligence so you can proactively defend against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the entire Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.

Hashes, IPs, domains, oh my, what am I to do with all this data? Analyze it. For threat intelligence to provide the proper context, you need to understand your audience and the requirements for intelligence consumption. Open source intelligence provides a capability for collecting intelligence data, but without analysis and requirements, collection efforts could produce a wild goose chase and provide little value.

In this webinar, Rob Gresham, Senior Consultant with Intel Security, will cut to the chase to answer relevant questions such as:

• Do I have data in the dark web and is it being sold?
• What are my greatest risks and are they exploitable?
• Has that exploit been used?

Rob will discuss the contextual threat intelligence process, and share tips and tools that will help you make threat intelligence actionable beyond just the bits and bytes.

Hashes, IPs, domains, oh my, what am I to do with all this data? Analyze it. For threat intelligence to provide the proper context, you need to understand your audience and the requirements for intelligence consumption. Open source intelligence provides a capability for collecting intelligence data, but without analysis and requirements, collection efforts could produce a wild goose chase and provide little value.

In this webinar, Rob Gresham, Senior Consultant with Intel Security, will cut to the chase to answer relevant questions such as:

• Do I have data in the dark web and is it being sold?
• What are my greatest risks and are they exploitable?
• Has that exploit been used?

Rob will discuss the contextual threat intelligence process, and share tips and tools that will help you make threat intelligence actionable beyond just the bits and bytes.

Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. Curating the necessary relevant data for this strategy, however, can be incredibly time consuming and resource intensive.

In this webinar, Greg Reith, Threat Intelligence Analyst at T-Mobile, will discuss how to use real-time threat intelligence from Recorded Future to create a forward-looking strategy, including:

• Identifying and analyzing hard-to-find threat data from the entire web including content in multiple languages.
• Gaining relevant intelligence effectively from large volumes of threat data with smart automation, alerts, and queries.
• Discovering trends and patterns that are useful in developing a forward-looking shift in strategy from multiple perspectives.

Find out how you can reduce the time to collect the necessary information for building an effective threat intelligence strategy by over 400 percent.

Certainly every bit akin to James Bond's 007 agent in the battle against corporate cyber attacks, state-sponsored assaults on corporate data or targeted, criminal data breaches, executive leaders like you must now be prepared to not only mitigate attacks but have some data prior in order to better fend off these onslaughts.

As such, threat intelligence is no less essential in defending against today’s cyber attack than political intelligence is needed in the world of global affairs of state. This webinar looks at the changing landscape in threat intelligence and how to create actionable defenses from the multiple data streams available today.

Anticipate and prioritize unknown threats better in Splunk with richer IOC context from the entire web enabled by real-time threat intelligence from Recorded Future. We will be joined by Vijay Chauhan, Director, Global Strategic Alliances – Security Markets for Splunk ES, who will provide an overview of the Adaptive Response Initiative.

Whether you're just getting started with threat intelligence, or you want to brush up on the basics, this webinar will serve as your guide to setting up and integrating a successful threat intelligence strategy for your SOC.

* Interaction from SOC functions to other parts of the business
* People and skillsets to make the SOC effective
* Processes to have a repeatable and effective operation
* How to quickly dismiss non-critical incidents with threat intelligence
* How to detect important incidents that are otherwise missed
* How to gain threat awareness beyond your network

Content is based on the new SANS MGT517 course entitled "Managing Security Operations: Detection, Response, and Intelligence."

* Applying real-time threat intelligence powered by machine learning cuts analyst time to triage a security event from a firewall log from three minutes to 1.2 seconds on average (in a controlled environment), resulting in a 10x gain in productivity.

* SOCs are unable to effectively examine some logs, such as firewall logs, as it is too much data with insufficient context to identify relevant threats hidden within them.

* Real-time threat intelligence can be automatically applied to potential indicators of compromise in logs by enriching them with external context and quantifying risk.

Join us for the second viewing of this webinar — scheduled at a time convenient for our followers in Europe.

Where your company is located affects its cyber health and physical security. Even though the internet has no borders, the closer an adversary is to your physical location the more harm they can inflict.

To fully know the level of cyber risk, organizations must understand the location-specific threat actors. These actors can be a host nation government that is monitoring your communications or APT style groups, cyber criminal groups, or hacktivists. An accurate cyber risk measurement by location improves management decision making, increases security awareness, reduces risk, and can increase operational effectiveness.

In this webinar Lincoln Kaffenberger, cyber security professional at an international financial services institution will examine:

• The related geographical cyber risks that people and organizations experience as they move from location to location.
• A framework for understanding, assessing, and measuring location-specific cyber risk.
• How threats and risks posed by them can be measured through an empirical model, standardized across all locations.
• How to quickly assess cyber threats related to a location using real-time threat intelligence from the open, deep, and dark web.

Where your company is located affects its cyber health and physical security. Even though the internet has no borders, the closer an adversary is to your physical location the more harm they can inflict.

To fully know the level of cyber risk, organizations must understand the location-specific threat actors. These actors can be a host nation government that is monitoring your communications or APT style groups, cyber criminal groups, or hacktivists. An accurate cyber risk measurement by location improves management decision making, increases security awareness, reduces risk, and can increase operational effectiveness.

In this webinar Lincoln Kaffenberger, cyber security professional at an international financial services institution will examine:

• The related geographical cyber risks that people and organizations experience as they move from location to location.
• A framework for understanding, assessing, and measuring location-specific cyber risk.
• How threats and risks posed by them can be measured through an empirical model, standardized across all locations.
• How to quickly assess cyber threats related to a location using real-time threat intelligence from the open, deep, and dark web.

How can enterprises use threat intelligence data to detect and stop attackers more quickly and efficiently? How can security teams identify the relevant threat information and use it to develop a swift defense? What specific threat information is needed, and how can enterprises use it to stop a particular attacker or exploit?

In this informative webinar you'll hear security experts discuss practical ways to use threat intelligence from the web to identify the methods used by online attackers and to ferret out sophisticated attacks that wouldn’t be recognized by traditional information security defenses.

Listen now and you'll also:

* Learn how to integrate threat intelligence into your current practices for enterprise data defense and incident response.
* Gain specific advice on how you can use real-time threat intelligence to fight new attacks targeted at your enterprise.

Prior to joining TIAA, Mike worked as a digital forensics and intrusion analyst for defense contractors supporting both public and private sector clients — while Joe was an information operations (IO) professional in the United States Marine Corps focusing on IO systems research and development.